Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5335: CWE-426 Untrusted Search Path in Autodesk Installer

0
High
VulnerabilityCVE-2025-5335cvecve-2025-5335cwe-426
Published: Tue Jun 10 2025 (06/10/2025, 14:50:15 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: Installer

Description

A maliciously crafted binary file when downloaded could lead to escalation of privileges to NT AUTHORITY/SYSTEM due to an untrusted search path being utilized in the Autodesk Installer application. Exploitation of this vulnerability may lead to code execution.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:03:15 UTC

Technical Analysis

CVE-2025-5335 is a vulnerability identified in Autodesk Installer version 2.13, categorized under CWE-426 (Untrusted Search Path). This vulnerability arises because the installer application uses an untrusted search path to locate binaries during its execution process. An attacker with the ability to place a malicious binary in a directory that the installer searches before the legitimate binary can cause the installer to execute this malicious code instead. This leads to escalation of privileges to NT AUTHORITY/SYSTEM, the highest privilege level on Windows systems. The vulnerability requires local access and some user interaction, such as running the installer or triggering its execution path. The CVSS v3.1 score is 7.8, reflecting high severity due to the potential for complete system compromise, including confidentiality, integrity, and availability impacts. The vulnerability is currently published with no known exploits in the wild and no patches released yet. The root cause is the insecure handling of search paths, allowing an attacker to influence which binaries are loaded. This flaw can be exploited by placing a crafted binary in a directory that is searched before the legitimate binary, such as the current working directory or a user-writable path. The Autodesk Installer is widely used in professional design and engineering environments, making this vulnerability particularly concerning for organizations relying on Autodesk software for critical workflows.

Potential Impact

The impact of CVE-2025-5335 is significant for organizations using Autodesk Installer 2.13 on Windows systems. Successful exploitation grants attackers SYSTEM-level privileges, enabling full control over affected machines. This can lead to unauthorized access to sensitive design files, intellectual property theft, disruption of engineering workflows, and potential lateral movement within networks. The ability to execute arbitrary code with elevated privileges also allows attackers to disable security controls, install persistent malware, or disrupt availability by damaging system components. Given Autodesk's widespread use in industries such as architecture, engineering, construction, and manufacturing, the vulnerability poses risks to critical infrastructure and intellectual property globally. Organizations with lax local security controls or those allowing untrusted users local access are at higher risk. Although no exploits are currently reported in the wild, the high severity and ease of exploitation once local access is obtained make this a pressing threat to address proactively.

Mitigation Recommendations

Until an official patch is released by Autodesk, organizations should implement specific mitigations to reduce risk: 1) Restrict write permissions on directories included in the installer's search path, especially user-writable locations and the current working directory, to prevent placement of malicious binaries. 2) Use application whitelisting to allow only trusted binaries to execute during installation processes. 3) Educate users to avoid running installers from untrusted locations or sources and to verify installer integrity. 4) Employ endpoint detection and response (EDR) solutions to monitor for suspicious process execution and privilege escalation attempts related to the installer. 5) Isolate systems running Autodesk software to limit local access to trusted personnel only. 6) Monitor Autodesk forums and vendor advisories closely for patch releases and apply updates promptly. 7) Consider using Windows security features such as Controlled Folder Access and Windows Defender Application Control to restrict unauthorized binary execution. These targeted mitigations go beyond generic advice by focusing on controlling the search path environment and local access controls specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
autodesk
Date Reserved
2025-05-29T14:52:55.445Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f551b0bd07c3938a3fa

Added to database: 6/10/2025, 6:54:13 PM

Last enriched: 2/27/2026, 4:03:15 AM

Last updated: 5/9/2026, 8:39:42 PM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses